Various technologies and techniques detect lists in vector graphics based documents and use them in meaningful ways. The system detects at least one list in a vector graphics based document using a set of rules. Pattern detection logic identifies characters, symbols, numbers, letters, and/or images that may start a list. Additional pattern detection logic determines if a list exists. The system can identify and parse bulleted lists, numbered or lettered lists, and nested lists that are any combination of both. Once identified, the content is translated into a modified format. The content can be output to a destination application in the modified format that is more suitable for output or use by the destination application.
|
19. A method for interpreting a vector graphics based document comprising:
receiving an input from a user to copy a section of content, the content having an original format that includes a set of list rendering instructions;
interpreting the list rendering instructions to detect that at least one list exists in the vector graphics based document, wherein a list is detected based upon a same word indentation for a first word of respective list items, wherein the first word of respective list items follow at least one of a letter, number, and symbol indicative of the list item;
translating the content into a modified format, wherein the modified format is chosen based on a destination application; and
providing the content in the modified format to the destination application for output.
1. A method for recognizing a list in a vector graphics based document comprising:
receiving the vector graphics based document in an original format, the original format having a set of list rendering instructions for at least one list in the vector graphics based document;
parsing the vector graphics based document to determine that the at least one list exists in the vector graphics based document, wherein the parsing comprises identifying a plurality of list items, the list items identified based upon a same word indentation for a first word of respective list items, wherein the first word of respective list items follow at least one of a letter, number, and symbol indicative of the list item; and
outputting the list to an output medium in a modified format, where the modified format is chosen based on the particular output medium.
13. A computer-readable storage medium having computer-executable instructions that when executed by a processor of a computing system perform a method comprising:
detecting at least one list within a vector graphics based document using a set of rules, the rules comprising:
detecting whether a bulleted list is present by applying a first logic to determine if a plurality of list items have a same first character, have a same indention of for the first character, and have a same word indentation for a first word, wherein the first word of respective list items follow the first character of the respective list items; and
detecting whether a numbered list is present by applying a second logic to determine if the plurality of list items have a sequential first character, have the same indentation for the first character, and have a same word indentation for a first word, wherein the first word of respective list items follow the first character of the respective list items;
translating the at least one list to a modified format; and
outputting the modified format to an output medium.
2. The method of
3. The method of
6. The method of
7. The method of
8. The method of
9. The method of
10. The method of
parsing a first line of the vector graphics based document to detect a character of a first list item;
parsing a second line of the vector graphics based document to detect a character of a second list item, wherein the second list item is different than the first list item, wherein the character of the second list item is at least one of a character identical to the character of the first list item and a character sequential to the character of the first list item;
verifying that the first and second list items are items of the at least one list, the verification comprising comparing a left indent of the character of the first list item with a left indent of the character of the second list item; and
determining that the at least one list exists based upon the verification.
11. The method of
12. The method of
14. The computer-readable storage medium of
15. The computer-readable storage medium of
16. The computer-readable storage medium of
17. The computer-readable storage medium of
18. The computer-readable storage medium of
20. The method of
|
Vector graphics based document exchange formats, such as a portable document format (PDF), provide a set of rendering instructions that allow documents to be interpreted and displayed to users in a standardized fashion, without requiring a user's computer to have the original software application that the content was created in. MICROSOFT® created XML Paper Specification (XPS) as a vector graphics based document format to allow XML content to be rendered in a standardized and meaningful way. One problem with vector graphics based documents is that viewing applications may know very little about the real content of a particular document except for how to render it correctly. For example, the viewing application may have no idea that the content of the document includes one or more bulleted or numbered lists.
Lists can deliver information in ways that are easier to read and understand than plain text. The presence of lists in a vector graphics based document presents particular problems when converting the documents to more end-user-friendly formats used in destination programs. Viewing applications will have information describing how to draw the lists, but they do not necessarily have any information indicating that what they are drawing is a list, so they may be limited in their ability to read or copy the list in a way that is meaningful to the user. The issue of rendering lists meaningfully is complicated by the potential presence of nested lists, or lists within lists. Take for example, a main list, numbered 1, 2, 3. Suppose item 1 consists of items underneath it numbered a, b, and c. Within that list designated by lower case letters, “a” contains items 1) and 2)—in effect, a third list. As you can see from this example, this list actually consists of three lists from a programming standpoint.
Various technologies and techniques are disclosed that allow for detecting lists within vector graphics based, including XML based, documents and rendering them in meaningful ways. Bulleted lists as well as numbered lists can be identified based on a set of rules. One or more of the disclosed technologies and techniques do this by detecting and differentiating patterns. This includes searches for characters, symbols, numbers, letters, and/or images that may start a list. The technology determines whether that signals the start of a list. Patterns are searched for in subsequent lines to determine if a list exists. Furthermore, logic is used to search for and identify nested lists. By way of example and not limitation, the technology can identify a bulleted list with a numbered list nested in it, or vice versa. The system allows content to be output to destination applications in a modified format that is more suitable for output or use by a destination application. Alternatively or additionally, lists can be recognized and translated to a screen reader that understands the input and utilizes voice output technology to make proper audible sounds to represent the list.
This Summary was provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
For the purposes of promoting an understanding of the principles of the invention, reference will now be made to the embodiments illustrated in the drawings and specific language will be used to describe the same. It will nevertheless be understood that no limitation of the scope is thereby intended. Any alterations and further modifications in the described embodiments, and any further applications of the principles as described herein are contemplated as would normally occur to one skilled in the art.
The system may be described in the general context as an application used to detect lists and list items based on the rendering instructions given in an XPS document or other vector graphics based document formats, but the system also serves other purposes in addition to these. One or more of the techniques described herein can be implemented as features within software programs such as MICROSOFT® Office Word, MICROSOFT® Office POWERPOINT®, Adobe Acrobat, XPS viewers, and/or from any other type of program or service that allows creation of or can utilize lists. As described in further detail herein, in one implementation of the system, lists are recognized and translated to the format used in destination documents. In another implementation, lists can be recognized and translated to a screen reader that understands the input and utilizes voice output technology to make proper audible sounds identifying the list, read the text in the list, and explain the order of the list to the person who is listening.
As shown in
Additionally, device 100 may also have additional features/functionality. For example, device 100 may also include additional storage (removable and/or non-removable) including, but not limited to, magnetic or optical disks or tape. Such additional storage is illustrated in
Computing device 100 includes one or more communication connections 114 that allow computing device 100 to communicate with one or more documents 115, such as XPS documents or other vector graphics based documents. Computing device 100 may also communicate with one or more computers and/or applications 113. Device 100 may also have input device(s) 112 such as keyboard, mouse, pen, voice input device, touch input device, etc. Output device(s) 111 such as a display, speakers, printer, screen reader, etc. may also be included. These devices are well known in the art and need not be discussed at length here.
Turning now to
List recognition application 200 includes program logic 204, which is responsible for carrying out some or all of the techniques described herein. Program logic 204 includes logic for detecting a bulleted or numbered list 206 and for applying a recursive algorithm to detect a nested list within a list 208. Program logic 204 also includes the logic for outputting or displaying the content of the list(s) in a modified format more suitable for output or use 210, such as to a file, display device, screen reader, and/or a another application. Program logic 220 includes other logic for operating the application. In one implementation, program logic 204 is operable to be called programmatically from another program, such as using a single call to a procedure in program logic 204.
In one implementation, program logic 204 resides on computing device 100. However, it will be understood that program logic 204 can alternatively or additionally be embodied as computer-executable instructions on one or more computers and/or in different variations. As one non-limiting example, one or more parts of program logic 204 could alternatively or additionally be implemented as a web-based application that is called when needed.
Turning now to
The procedure begins on
Turning now to
The system detects the first character or image of a line that could be the start of a list (324). By way of example and not limitation, this character can be a hyphen (-), an asterisk (*), a greater-than sign (>), a plus sign (+), or another keyboard character or image that could signal the start of a bulleted list. The system determines if that is the start of a list by scanning the next line to see if it starts with the same character (decision point 326). If so, then additional considerations are taken to determine if both lines constitute items in a list. For example, if the left indent of the first character on the line being considered is the same as the first character on the first line (decision point 328), then the system also checks to see if the left indent is the same for the first word (decision point 332).
In one implementation, if all of these criteria are met, then the item is treated as a list item. In another implementation, some of these criteria and/or additional criteria are used to determine the item is a bulleted list item. The system continues checking for more items in the list (stage 334). If the end of the list is not found (decision point 336), then the process repeats beginning with looking for another consecutive item with an identical character or image (stage 326).
If the system evaluates the one or more various list criteria and determines the item is not part of the prior list, it then checks to see if the item is part of a nested list (decision point 330). If a possible nested list is detected (decision point 330), then the list criteria are also evaluated for the possible nested list. Once all possible lists have been identified and the end of the document is reached (decision point 331), the system executes logic for changing the content into the format of the destination document (stage 338), and displays the content appropriately (stage 340). The process ends at end point 342.
Turning now to
The system detects if that is the start of a list by scanning the next line to see if it starts with the same character (stage 378). If so, then additional considerations are taken to determine if both lines constitute items in a list. Such considerations include, but are not limited to, whether left indentation of the number or letter (stage 382), left indentation of the first word after the number or letter (stage 384), and left indentation of the next word (stage 386) are the same for both items. In one implementation if all of these criteria are met, then the item is treated as a numbered or lettered list item. In another implementation, some of these criteria are used to determine the item is a numbered or lettered list item. The system continues checking for more items in the list (stage 388). If the end of the list is not found (decision point 390), then the process repeats beginning with looking for another consecutive item with a consecutive letter or number (stage 378).
If the system evaluates the one or more list criteria and determines the item is not part of the prior list, it then checks to see if the item is part of a nested list (decision point 380). If a possible nested list is detected (decision point 380), then the stages are repeated to look for a nested list. Once all possible lists have been identified and the end of the document is reached (decision point 391) the system executes logic for changing the content into the format of the destination document (stage 392), and displays the content appropriately (stage 394). The process ends at end point 396.
As discussed previously, in one implementation, the system can also detect nested lists. By way of example and not limitation, the system can detect a bulleted list within a numbered or lettered list, as well as a numbered or lettered list within a numbered or lettered list.
The items in this nested list are examined as well (stage 426) to see if more than one level of nesting exists. If this is found (stage 428), then the system executes a recursive algorithm to check for items in a second level of nested list. This continues until all items are identified for all levels of lists. The items are grouped accordingly, and are compiled so that they can be displayed accurately onscreen or in print in the destination application (stage 430). The process ends at end point 432.
Turning now to
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims. All equivalents, changes, and modifications that come within the spirit of the implementations as described herein and/or by the following claims are desired to be protected.
For example, a person of ordinary skill in the computer software art will recognize that the client and/or server arrangements, user interface screen content, and/or data layouts as described in the examples discussed herein could be organized differently on one or more computers to include fewer or additional options or features than as portrayed in the examples.
Liu, Ming, McGatha, Jesse D., Gurcan, Ahmet, Lopez, Rodrigo, Foehr, Oliver H., Dunietz, Jerry J., Leese, Eric S., Sedky, Khaled S., Brown, Jeffrey G.
Patent | Priority | Assignee | Title |
11262979, | Sep 18 2019 | Bank of America Corporation | Machine learning webpage accessibility testing tool |
8806330, | Aug 26 2011 | International Business Machines Corporation | Automatic detection of item lists within a web page |
9251287, | Aug 26 2011 | International Business Machines Corporation | Automatic detection of item lists within a web page |
9483740, | Sep 06 2012 | Go Daddy Operating Company, LLC | Automated data classification |
9516089, | Sep 06 2012 | Locu, Inc. | Identifying and processing a number of features identified in a document to determine a type of the document |
9842251, | Jan 29 2016 | Konica Minolta Laboratory U.S.A., Inc. | Bulleted lists |
Patent | Priority | Assignee | Title |
5517578, | May 20 1993 | Microsoft Technology Licensing, LLC | Method and apparatus for grouping and manipulating electronic representations of handwriting, printing and drawings |
5613019, | May 20 1993 | Microsoft Corporation | System and methods for spacing, storing and recognizing electronic representations of handwriting, printing and drawings |
6209124, | Aug 30 1999 | TouchNet Information Systems, Inc. | Method of markup language accessing of host systems and data using a constructed intermediary |
6430624, | Oct 21 1999 | AIR2WEB, INC ; WEISS, PECK & GREER VENTURE ASSOCIATES V, L C C , INC | Intelligent harvesting and navigation system and method |
6487566, | Oct 05 1998 | LinkedIn Corporation | Transforming documents using pattern matching and a replacement language |
6587587, | May 20 1993 | Microsoft Corporation | System and methods for spacing, storing and recognizing electronic representations of handwriting, printing and drawings |
6782380, | Apr 14 2000 | Method and system for indexing and searching contents of extensible mark-up language (XML) documents | |
7203903, | May 20 1993 | Microsoft Corporation | System and methods for spacing, storing and recognizing electronic representations of handwriting, printing and drawings |
7295708, | Sep 24 2003 | Microsoft Technology Licensing, LLC | System and method for detecting a list in ink input |
7394935, | Sep 21 2004 | Microsoft Technology Licensing, LLC | System and method for editing a hand-drawn chart in ink input |
20020090118, | |||
20020178007, | |||
20020178135, | |||
20040093355, | |||
20050022115, | |||
20050108630, | |||
20050132342, | |||
EP1107169, | |||
WO3098370, | |||
WO3098370, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Jan 30 2006 | GURCAN, AHMET | Microsoft Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 018750 | /0066 | |
Jan 30 2006 | LEESE, ERIC S | Microsoft Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 018750 | /0066 | |
Jan 30 2006 | BROWN, JEFFREY G | Microsoft Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 018750 | /0066 | |
Jan 30 2006 | LOPEZ, RODRIGO | Microsoft Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 018750 | /0066 | |
Jan 30 2006 | SEDKY, KHALED S | Microsoft Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 018750 | /0066 | |
Jan 31 2006 | MCGATHA, JESSE D | Microsoft Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 018750 | /0066 | |
Jan 31 2006 | DUNIETZ, JERRY J | Microsoft Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 018750 | /0066 | |
Jan 31 2006 | LIU, MING | Microsoft Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 018750 | /0066 | |
Feb 08 2006 | FOEHR, OLIVER H | Microsoft Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 018750 | /0066 | |
Feb 09 2006 | Microsoft Corporation | (assignment on the face of the patent) | / | |||
Oct 14 2014 | Microsoft Corporation | Microsoft Technology Licensing, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 034543 | /0001 |
Date | Maintenance Fee Events |
Apr 24 2014 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Jul 02 2018 | REM: Maintenance Fee Reminder Mailed. |
Dec 24 2018 | EXP: Patent Expired for Failure to Pay Maintenance Fees. |
Date | Maintenance Schedule |
Nov 16 2013 | 4 years fee payment window open |
May 16 2014 | 6 months grace period start (w surcharge) |
Nov 16 2014 | patent expiry (for year 4) |
Nov 16 2016 | 2 years to revive unintentionally abandoned end. (for year 4) |
Nov 16 2017 | 8 years fee payment window open |
May 16 2018 | 6 months grace period start (w surcharge) |
Nov 16 2018 | patent expiry (for year 8) |
Nov 16 2020 | 2 years to revive unintentionally abandoned end. (for year 8) |
Nov 16 2021 | 12 years fee payment window open |
May 16 2022 | 6 months grace period start (w surcharge) |
Nov 16 2022 | patent expiry (for year 12) |
Nov 16 2024 | 2 years to revive unintentionally abandoned end. (for year 12) |